MCQGeeks
0 : 0 : 1
CBSE
JEE
NTSE
NEET
English
UK Quiz
Quiz
Driving Test
Practice
Games
Quiz
Cryptography Network Security
Tough Network Security
Quiz 1
1
2
3
4
5
6
7
8
9
10
Q.1
On which port will the server generally listen to for SMTP?
a) port 35
b) port 63
c) port 25
d) port 65
Q.2
In the alert protocol the first byte takes the value 1 or 2 which corresponds to ________ and _________ respectively.
a) Select, Alarm
b) Alert, Alarm
c) Warning, Alarm
d) Warning, Fatal
Q.3
In terms of Web Security Threats, “Impersonation of another user” is a Passive Attack.
a) True
b) False
Q.4
In the SSL record protocol operation pad_1 is :
a) is the byte 0x36 repeated 40 times for MD5
b) is the byte 0x5C repeated 40 times for MD5
c) is the byte 0x5C repeated 48 times for SHA-1
d) is the byte 0x36 repeated 48 times for MD5
Q.5
In the Phase 2 of the Handshake Protocol Action, the step server_key_exchange is not needed for which of the following cipher systems?
a) Fortezza
b) Anonymous Diffie-Hellman
c) Fixed Diffie-Hellman
d) RSA
Q.6
Which key exchange technique is not supported by SSLv3?
a) Anonymous Diffie-Hellman
b) Fixed Diffie-Hellman
c) RSA
d) Fortezza
Q.7
An HTTP connection uses port __________ whereas HTTPS uses port __________ and invokes SSL.
a) 40; 80
b) 60; 620
c) 80; 443
d) 620; 80
Q.8
SSID stands for
a) Secure Service Identifier
b) Secure Set Independent Device
c) Secure Set Identifier
d) Service Set Independent Device
Q.9
“When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?
a) Identity Theft
b) Man in the middle attack
c) Network Injection
d) Accidental Association
Q.10
Loopback address is given by:
a) 0.0.0.0
b) 127.x.x.x
c) 255.255.255.255
d) None of the mentioned
0 h : 0 m : 1 s
1
2
3
4
5
6
7
8
9
10
Report Question
×
What's an issue?
Question is wrong
Answer is wrong
Other Reason
Want to elaborate a bit more? (optional)